Nameles-Org / NamelesLinks
Open source entropy based invalid traffic detection and pre-bid filtering.
☆70Updated 6 years ago
Alternatives and similar repositories for Nameles
Users that are interested in Nameles are comparing it to the libraries listed below
Sorting:
- A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.☆92Updated 2 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆78Updated last year
- ☆78Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- A finder of domain typos showing country of IP address☆167Updated last year
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Updated 9 years ago
- detectem - detect software and its version on websites.☆157Updated 4 years ago
- YAPDNS☆39Updated 10 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Updated 7 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Collects WHOIS details for every IPv4 netblock. Reports supported via Elasticsearch.☆103Updated 6 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 4 years ago
- The NoSQL Honeypot Framework☆101Updated last year
- Internet data processing tools☆54Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- ☆56Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- web based nmap scan collection and search☆19Updated 4 years ago
- Help summarize a PCAP file☆33Updated 13 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- Drupal Honeypot☆57Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year